Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 17:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.profitablegatecpm.com/jvnrx2qwr?key=b0ee1e2d346afce0dc05583d67e4cdf8&psid=oneuploadtomainstreamnonadultpu
Resource
win10v2004-20240426-en
General
-
Target
https://www.profitablegatecpm.com/jvnrx2qwr?key=b0ee1e2d346afce0dc05583d67e4cdf8&psid=oneuploadtomainstreamnonadultpu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133624286449491396" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2752 chrome.exe 2752 chrome.exe 4720 chrome.exe 4720 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2752 chrome.exe 2752 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2752 wrote to memory of 316 2752 chrome.exe 80 PID 2752 wrote to memory of 316 2752 chrome.exe 80 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 1008 2752 chrome.exe 81 PID 2752 wrote to memory of 3740 2752 chrome.exe 82 PID 2752 wrote to memory of 3740 2752 chrome.exe 82 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83 PID 2752 wrote to memory of 3260 2752 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.profitablegatecpm.com/jvnrx2qwr?key=b0ee1e2d346afce0dc05583d67e4cdf8&psid=oneuploadtomainstreamnonadultpu1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceff1ab58,0x7ffceff1ab68,0x7ffceff1ab782⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1668,i,5436706212705742354,5482243854446910122,131072 /prefetch:22⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1668,i,5436706212705742354,5482243854446910122,131072 /prefetch:82⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1668,i,5436706212705742354,5482243854446910122,131072 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1668,i,5436706212705742354,5482243854446910122,131072 /prefetch:12⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1668,i,5436706212705742354,5482243854446910122,131072 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4428 --field-trial-handle=1668,i,5436706212705742354,5482243854446910122,131072 /prefetch:82⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 --field-trial-handle=1668,i,5436706212705742354,5482243854446910122,131072 /prefetch:82⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1668,i,5436706212705742354,5482243854446910122,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
852B
MD50e7966575644ea8e8410b22a96885204
SHA1efe9152e2d0e73245ce0c201603e293fb7107cd6
SHA256fde057234e1f5408add70caf784fc2dcd96aca323164bed87261e17321cb1099
SHA512b25ba1d99a5f515eec7f133ec014379a5d63d7f7649a1b0f24a3401333428a06b957e00b6c0962cc5fde59ed6e3de9ffb703e8945dd8c24e6b3ccfaa7db09c72
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD52e3d6ba9a01f85ba4c3ae4e6419a039a
SHA17f947f30e57beda2af3e438e65f13d3de99ab359
SHA25639164e90bdc33eecf6a13eb255c003a059272445d90424778c89f2e408d4637e
SHA512e423c357cfc37201352c5ad19a01bf6f0e6236a41b00b60b42a9184d808282ce812d16da4da43c1371062016620b17c97aa341adc4bb1ed77b0db86f9cb60f33
-
Filesize
7KB
MD53d7d84147dcf1f5bd3aa8e8f7164bfc4
SHA15a88f4e3360a859b72cb99fd575016af8d337d00
SHA256af54a3eb101a0878948714b5c4c375016b75b40c3eee61cf331f32bb12dfded1
SHA51247275f2d91cdff487731b6731c693cd873068613f26cd0c0e49850c0c438bb16e072ca7cb2922a1d96911342f65bbcce2381c7ac4c400db43184487142862bfe
-
Filesize
130KB
MD55eb6e6f8d0128b0c29ddf3d32797b350
SHA1c0d8c0c864085ce865526021df86a9f92a3cccc2
SHA25680e0e6e34d1dbfa67deb1f63f7bcc67be1d1402662da2fd5c7c6ccf84c3888cd
SHA51203c9e9f20dbd88660dcd5759d48e7031b54781cad0249e5d189ec7214e4d1c234da4c5d470594d8a9c4599c17d9aa6a83055c38da60822d3e6e744b71683d1bd